Explore Catalogue

Discover and learn from our extensive collection of world-class courses and curriculums tailored to your needs.

Found 16 results
Sort by:
Show:
Active Filters:
Category: Cybersecurity
Becoming a Cyber Warrior Certification Program

Becoming a Cyber Warrior Certification Program

Learn key skills of cybersecurity and earn a Certification from the Starweaver Institute. Today, the necessity of strong cybersecurity measures is self-evident. A proliferation of cyber-attacks is causing increasing damage to companies, governments, and individuals. Yahoo’s disclosure of a massive breach is still making headlines. Organizations need to respond to this increased threat by adopting strict cybersecurity measures. Starweaver is here to help you and your organization respond, building you into "CyberWarriors" with our 7-Part certification program focused on helping you know you to prevent, and face cyber-attacks. This program includes modules on: Part I: Building a Security Skills Foundation Part II: Leveraging Wireshark for Security Part III: Essential Defensive Strategies Part IV: Building a Cyber Range Part V: Penetration Testing Unveiled Part VI: Intrusion Analysis Part VII: Intrusion Handling

Learn key skills of cybersecurity and earn a Certification from the Starweaver Institute. Today, the necessity of strong cybersecurity measures is self-evident. A proliferation of cyber-attacks is causing increasing damage to companies, governments, and individuals. Yahoo’s disclosure of a massive breach is still making headlines. Organizations need to respond to this increased threat by adopting strict cybersecurity measures. Starweaver is here to help you and your organization respond, building you into "CyberWarriors" with our 7-Part certification program focused on helping you know you to prevent, and face cyber-attacks. This program includes modules on: Part I: Building a Security Skills Foundation Part II: Leveraging Wireshark for Security Part III: Essential Defensive Strategies Part IV: Building a Cyber Range Part V: Penetration Testing Unveiled Part VI: Intrusion Analysis Part VII: Intrusion Handling

Related To:

Product ID: OC-2024-C1G2C
Analyzing and Defending Networks with Wireshark

Analyzing and Defending Networks with Wireshark

Analyzing and Defending Networks with Wireshark This course provides students a complete foundational understanding of the process for conducting network protocol analysis, an essential skill required for a number of high value careers in the cybersecurity field. Protocol analysis is the technique of analyzing what is or has taken place on a network and is used by Security Operations Center analysts, as well as others including network forensics investigators. In this course, we take static capture files that you will be provided and show you how to analyze each with the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.

Analyzing and Defending Networks with Wireshark This course provides students a complete foundational understanding of the process for conducting network protocol analysis, an essential skill required for a number of high value careers in the cybersecurity field. Protocol analysis is the technique of analyzing what is or has taken place on a network and is used by Security Operations Center analysts, as well as others including network forensics investigators. In this course, we take static capture files that you will be provided and show you how to analyze each with the Wireshark tool. You will learn ways to quickly identify anything that is abnormal within a network packet capture. This will provide you with the initial skills for intrusion analysis, and also malware tracking and monitoring.

Related To:

Product ID: OC-2024-C17JO
Data Privacy and Protection StandardsNew

Data Privacy and Protection Standards

This course provides a comprehensive understanding of the foundational principles of data privacy, the latest in protection standards, and practical approaches to implementing robust data protection measures. Participants will explore key regulations such as the GDPR and CCPA, delve into technical and organizational strategies for data security, and learn how to handle data breaches effectively. Through this course, learners will gain insights into the rights of data subjects and the ethical considerations surrounding data protection. Upon completion, participants will be equipped with the knowledge to navigate the complexities of data privacy laws and implement measures that ensure data integrity and confidentiality.

This course provides a comprehensive understanding of the foundational principles of data privacy, the latest in protection standards, and practical approaches to implementing robust data protection measures. Participants will explore key regulations such as the GDPR and CCPA, delve into technical and organizational strategies for data security, and learn how to handle data breaches effectively. Through this course, learners will gain insights into the rights of data subjects and the ethical considerations surrounding data protection. Upon completion, participants will be equipped with the knowledge to navigate the complexities of data privacy laws and implement measures that ensure data integrity and confidentiality.

Related To:

Product ID: OC-2024-C1CP6
Deception as a DefenseNew

Deception as a Defense

In this course, defensive concepts will be explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again. In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again. These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!

In this course, defensive concepts will be explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again. In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again. These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!

Related To:

Product ID: OC-2024-C1DAL
Essential Guide to Cybersecurity

Essential Guide to Cybersecurity

Organizations which control, store, or transmit data are increasingly exposed to active hackers, phishing scams and other threats that arise from poor information security. Cybersecurity Essentials is the ideal course for anyone who needs to get a good all-round understanding of Cybersecurity. It provides an understanding of the fundamental principles of cybersecurity at a decision-making level. You don't have to be an aspiring security professional to do this course, it is suitable for everyone. This course represents the essentials of Cybersecurity, and it is designed in the way that the capabilities learned by following this training course will be used to protect organizations and the society as a whole from areas of emerging threats.

Organizations which control, store, or transmit data are increasingly exposed to active hackers, phishing scams and other threats that arise from poor information security. Cybersecurity Essentials is the ideal course for anyone who needs to get a good all-round understanding of Cybersecurity. It provides an understanding of the fundamental principles of cybersecurity at a decision-making level. You don't have to be an aspiring security professional to do this course, it is suitable for everyone. This course represents the essentials of Cybersecurity, and it is designed in the way that the capabilities learned by following this training course will be used to protect organizations and the society as a whole from areas of emerging threats.

Related To:

Product ID: OC-2024-C1FD8
GenAI for Cybersecurity AnalystsNew

GenAI for Cybersecurity Analysts

As part of the GenAI Academy, “GenAI for Cybersecurity Analysts” explores how Generative Artificial Intelligence (GenAI) is revolutionizing the field of cybersecurity. This course guides learners through the key capabilities of GenAI and provides practical strategies to leverage these tools in their daily tasks. Through discussions, video demos, and guided hands-on activities, learners will understand how GenAI can enhance productivity in threat detection, risk mitigation, security testing, and more.  Learners will also consider the ethical concerns surrounding the use of GenAI in cybersecurity, examining potential risks and challenges, as well as best practices for responsible implementation. By the end of this course, cybersecurity analysts will be equipped with the knowledge and skills to harness the transformative potential of GenAI to enhance their productivity and effectiveness.  Whether you’re an experienced cybersecurity analyst looking to stay ahead of the curve or an aspiring professional seeking to future-proof your skillset, this course provides a foundation that will empower you to unlock new levels of efficiency, productivity, and creativity in your work.

As part of the GenAI Academy, “GenAI for Cybersecurity Analysts” explores how Generative Artificial Intelligence (GenAI) is revolutionizing the field of cybersecurity. This course guides learners through the key capabilities of GenAI and provides practical strategies to leverage these tools in their daily tasks. Through discussions, video demos, and guided hands-on activities, learners will understand how GenAI can enhance productivity in threat detection, risk mitigation, security testing, and more. 

Learners will also consider the ethical concerns surrounding the use of GenAI in cybersecurity, examining potential risks and challenges, as well as best practices for responsible implementation. By the end of this course, cybersecurity analysts will be equipped with the knowledge and skills to harness the transformative potential of GenAI to enhance their productivity and effectiveness. 

Whether you’re an experienced cybersecurity analyst looking to stay ahead of the curve or an aspiring professional seeking to future-proof your skillset, this course provides a foundation that will empower you to unlock new levels of efficiency, productivity, and creativity in your work. 

Related To:

Product ID: OC-2024-C15GM
Incident Response and Handling for Cyber Security Professionals

Incident Response and Handling for Cyber Security Professionals

This course covers the six phases of incident handling and responding as follows:  0- Introduction: Includes the definition of an event, incident, as well as the difference between them  1- Preparation Phase: Shows the elements of preparation and the team building,  2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification  3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken  4- Eradication: Stresses on restoring systems and improving defenses  5- Recovery: Elaborates the validation and monitoring required for attacked systems  6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others

This course covers the six phases of incident handling and responding as follows:  0- Introduction: Includes the definition of an event, incident, as well as the difference between them  1- Preparation Phase: Shows the elements of preparation and the team building,  2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification  3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken  4- Eradication: Stresses on restoring systems and improving defenses  5- Recovery: Elaborates the validation and monitoring required for attacked systems  6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others 

Related To:

Product ID: OC-2024-C1FLO
Introduction to Cybersecurity

Introduction to Cybersecurity

If you are looking to start your career in cybersecurity or freshly graduated from school, this is the right course for you! Learning cybersecurity is fundamental to every role as a technologist, or a business professional in the technology arena. This course empowers you with foundational cybersecurity skills.  Core cybersecurity fundamentals General overview about Cyber Security Cybersecurity market size Confusions: Cybersecurity or Cyber Security Confusions: Cybersecurity vs information security Cybersecurity professional roadmap Top cybersecurity certifications by Hacker’s techniques and motivations Understand hacker’s mindset Hackers categories What motivates hackers to hack Understand the cybersecurity kill chain Hacking techniques Malicious software used by hackers [LAB] How hackers generate malicious software [LAB] How to detect that your machine is infected and how to protect yourself Cybersecurity law and standards Laws and standards that you need to know ISO27001 NIST Framework PCI-DSS Cybersecurity USA Laws Cybersecurity EU Laws Cybersecurity Australia Laws

If you are looking to start your career in cybersecurity or freshly graduated from school, this is the right course for you! Learning cybersecurity is fundamental to every role as a technologist, or a business professional in the technology arena. This course empowers you with foundational cybersecurity skills.  Core cybersecurity fundamentals

  • General overview about Cyber Security
  • Cybersecurity market size
  • Confusions: Cybersecurity or Cyber Security
  • Confusions: Cybersecurity vs information security
  • Cybersecurity professional roadmap
  • Top cybersecurity certifications by

Hacker’s techniques and motivations Understand hacker’s mindset

  • Hackers categories
  • What motivates hackers to hack
  • Understand the cybersecurity kill chain
  • Hacking techniques
  • Malicious software used by hackers
  • [LAB] How hackers generate malicious software
  • [LAB] How to detect that your machine is infected and how to protect yourself

Cybersecurity law and standards Laws and standards that you need to know

  • ISO27001
  • NIST Framework
  • PCI-DSS
  • Cybersecurity USA Laws
  • Cybersecurity EU Laws
  • Cybersecurity Australia Laws

Related To:

Product ID: OC-2024-C18EG
Introduction to Cybersecurity FundamentalsNew

Introduction to Cybersecurity Fundamentals

This course focuses on building a foundation for the principles of Cyber Security and protections of data within computers, devices and networks. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted. Once your foundation has been set you will look at the best practices recommendations when it comes to protecting your data and privacy.

This course focuses on building a foundation for the principles of Cyber Security and protections of data within computers, devices and networks. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted. Once your foundation has been set you will look at the best practices recommendations when it comes to protecting your data and privacy.

Related To:

Product ID: OC-2023-D1YZT
Introduction to DevSecOps

Introduction to DevSecOps

This DevOps course is an introduction to DevSecOps and how its applied across the application development lifecycle.  This program starts with some fundamentals about what is DevOps, why DevOps is such an important part of today’s software landscape and what impact it has on systems security.  DevSecOps is a new concept brought on by DevOps and has implications all throughout the software development lifecycle.  This course explores the various aspects of DevSecOps including CI/CD, Containers, SAST, IAST, Dynamic, and scanning for secrets.  In the end we will talk about how we can begin this journey to DevSecOps and end successfully. The program contains 10 modules and 3 hours of content.

This DevOps course is an introduction to DevSecOps and how its applied across the application development lifecycle.  This program starts with some fundamentals about what is DevOps, why DevOps is such an important part of today’s software landscape and what impact it has on systems security.  DevSecOps is a new concept brought on by DevOps and has implications all throughout the software development lifecycle.  This course explores the various aspects of DevSecOps including CI/CD, Containers, SAST, IAST, Dynamic, and scanning for secrets.  In the end we will talk about how we can begin this journey to DevSecOps and end successfully. The program contains 10 modules and 3 hours of content.

Related To:

Product ID: OC-2024-C1VXH